asterisk2a + backdoor   49

Investigatory Powers Bill: May defends surveillance powers - BBC News
Mrs May has said Britain's spies must continue to be allowed to hack into foreign computer networks, under so-called "bulk equipment interference warrants", as this was "a key operational requirement for GCHQ".
She told MPs that bulk powers had played a significant role in every major counter-terrorism investigation over the past decade, including seven terror plots foiled in the past 18 months, and in responding to the bulk of cyber attacks against UK interests.
Investigatory  Powers  Bill  Snoopers  Charter  Theresa  May  War  on  Terror  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  bulk  data  collection  Vorratsdatenspeicherung  Dataretention  Meta  GPS  mobilephone  Big  Meta  profiling  Smartphone  human  rights  backdoors  backdoor  Secret  Courts  MI5  MI6  GCHQ  organised  crime  activism  activist  Tories  Conservative  Party  David  Cameron  cyber  cyber  attack 
march 2016 by asterisk2a
Security Experts Warn of Orwellian Future in Apple Case | Re/code
[ all without a warrant ] Your Samsung smart TV or Amazon Echo might spy on you next if the government succeeds in forcing Apple to disable security protections on a smartphone to further the FBI’s investigation into the San Bernardino attacks. Security experts from Stanford, Harvard and Rice universities and independent researchers laid out this Orwellian scenario in a court filing today, supporting Apple’s fight against a court order to help investigators hack a smartphone used by one of the assailants in the mass killing. The group of seven experts argues that the judge’s order [...] disturbing possibilities for how law enforcement might turn everyday items into surveillance tools. //&! Amazon Quietly Disabled Encryption in Latest Version of Fire OS - on.recode.net/1TXeXPB //&! Twitter, Airbnb, eBay, Kickstarter, LinkedIn and Square File Brief Supporting Apple - on.recode.net/1LXQ3sG &! Three Industry Trade Groups to File Briefs Supporting Apple - on.recode.net/1oTUdwx
Apple  FBI  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  War  on  Terror  Patriot  Act  bulk  data  collection  Dataretention  Vorratsdatenspeicherung  Meta  Big  Smartphone  mobile  homescreen  anonymity  human  rights  FISA  Court  FISAAA  Secret  Courts  GCHQ  NSA  Snoopers  Charter  Yahoo!  backdoors  backdoor  GPS  profiling  Facebook  Twitter 
march 2016 by asterisk2a
Shami Chakrabarti: ‘Who’s the most dangerous person in Britain? David Cameron’ | Voluntary Sector Network | The Guardian
The outgoing Liberty director explains why plans to scrap the Human Rights Act threaten freedom, and why she won’t stop campaigning [...] I ask Chakrabarti – once branded by the Sun as “the most dangerous woman in Britain” – who she thinks deserves the “most dangerous” hallmark now. “Right now? David Cameron.” She says. “Actually, can I have more than one? Then him and that particular group in the cabinet now who are dedicated to scrapping the Human Rights Act. That group. They are an existential threat to the rights and freedoms of the most vulnerable people in our country.” [...] investigatory powers bill. “We wouldn’t let the state impose identity cards, but these,” she holds up her phone, “these we buy.”
UK  USA  David  Cameron  Tories  NSA  GCHQ  Secret  Courts  FISA  Court  FISAAA  Surveillance-Industrial  Complex  surveillance  state  Snoopers  Charter  Patriot  Act  human  rights  Act  Brexit  neoliberalism  neoliberal  neoconservatism  neoconservatives  Theresa  May  Schengen  Agreement  War  on  Terror  Torture  ISIS  far-right  Rechtsruck  Rechtsextremismus  Internet  Privacy  Privacy  Big  Data  Meta  Data  profiling  encryption  Cryptopocalypse  cryptography  backdoors  backdoor 
march 2016 by asterisk2a
Can we really trust judges to protect reporters' confidential sources? | Media | The Guardian
Journalists won’t even be safe to talk email whistleblowers from a coffee shop [...] In stressing that the powers would not be used for mass surveillance, May said the onus would be on the home office to show necessity and proportionality. And who would decide whether that was justified? Judicial commissioners, she said. They would operate a “double-lock” authorisation process on intercept and bulk interception warrants in order to prevent intrusive snooping. [ old boys club with career interests? titles, pensions? ] But will this judicial oversight provide enough protection? That’s the key worry for journalists who now know that there is nowhere for them to conceal their communications with confidential sources. [...] We already know from instances of the police use of the regulation of investigatory powers act (Ripa) //&! Police spying row officers decline Holyrood invitation - http://bbc.in/1RSXQxl
Snoopers  Charter  Theresa  May  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  free  press  Pressefreiheit  freedom  of  press  investigative  journalism  journalismus  journalism  Whistleblower  accounting  accountability  Career  Politicians  UK  USA  NSA  GCHQ  corporate  scandal  political  scandal  of  Information  Act  FOI  democracy  transparency  oversight  encryption  backdoors  backdoor  Westminster  War  on  Terror  organised  crime  War  on  Drugs  MI6  CIA  Toff  Privileged  Establishment  Edward  Snowden  Julian  Assange  Wikileaks  cablegate  Chelsea  Manning  Pentagon  Police 
january 2016 by asterisk2a
Apple raises concerns over UK's draft surveillance bill - BBC News
The US-based firm has passed on its thoughts to a parliamentary committee scrutinising the legislation. It focuses on three issues: encryption, the possibility of having to hack its own products, and the precedent it would set by agreeing to comply with UK-issued warrants. The Home Secretary Theresa May said last month that the proposed powers were needed to fight crime and terror. [...] But Apple appears to be concerned that the bill's language could still be interpreted more expansively and force the creation of a so-called "backdoor" to provide the authorities with access. Apple argues that the existence of such a backdoor would risk creating a weakness that others then might exploit, making users' data less secure. [...] Overseas warrants A second area of concern relates to the issue of "extra-territoriality". Existing British legislation - and the bill - maintain that companies need to comply with warrants for information wherever they are based and wherever the data resides.
Surveillance-Industrial  Complex  GCHQ  Snoopers  Charter  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  backdoors  backdoor  Vorratsdatenspeicherung  Dataretention  bulk  data  collection  human  rights  Theresa  May  Tories  nasty  party  Conservative  David  Cameron  George  Osborne  War  on  Terror  organised  crime  austerity  military–industrial  surveillance  state  NSA  propaganda  manufactured  consent  Polarisation  islamic  radicalism  islamic  extremism  ISIS  corporate  state  corporate  media  Lügenpresse  populism  Big  metadata  neoconservatism  neoconservatives  presidency  barackobama 
december 2015 by asterisk2a
Glenn Greenwald on why the CIA is smearing Edward Snowden after the Paris attacks: "The real objective is to depict Silicon Valley as terrorist-helpers for the crime of offering privacy protections to Internet users and to force them to give the U.S. gov
Glenn Greenwald on why the CIA is smearing Edward Snowden after the Paris attacks: "The real objective is to depict Silicon Valley as terrorist-helpers for the crime of offering privacy protections to Internet users and to force them to give the U.S. gov "backdoor" access into communications"
encryption  cryptography  Cryptopocalypse  War  on  Terror  backdoor  backdoors  Edward  Snowden  NSA  GCHQ  Surveillance-Industrial  Complex  surveillance  state  Orwellian  bulk  data  collection  Snoopers  Charter  Vorratsdatenspeicherung  Dataretention 
november 2015 by asterisk2a
Russia will fork Sailfish OS to shut out pesky Western spooks
Paranoia over NSA tampering spurs de-Westernisation drive // well only the Paranoid survive. [...] Russia’s Minister of Communications and Mass Media, Nikolai Nikiforov, has taken part in talks to form a consortium that will aid Russia in developing a custom mobile OS, reportedly a forked version of Jolla’s Sailfish OS, to lessen its dependence on Western technology. Nikiforov held a working meeting last week with the leadership of Hong Kong-based Sailfish Holdings, developer of the quietly admired Sailfish OS. Alongside other participants, the parties involved discussed the use of open-source software in the public and private sectors, taking into account technical, economic and political factors, the latter of which is expected to include United States’ interference with exported technologies.
Open  Source  Russia  corporate  espionage  industrial  espionage  cyber  espionage  NSA  Five  Eyes  Nationalism  barackobama  presidency  Europe  GCHQ  UK  Foreign  Intelligence  affairs  relations  2015  cyber  war  encryption  Angela  Merkel  Leadership  Career  Politicians  No  Representation  human  rights  Privacy  Internet  Privacy  Cryptopocalypse  cryptography  national  interest  False  Flag  on  Terror  on  Drugs  organised  crime  backdoors  backdoor  IT  Security  exploit  Germany  FRance  surveillance  Surveillance-Industrial  Complex  surveillance  state  Orwellian  corporate  state  manufactured  consent  Cold  propaganda  populism  Pressefreiheit  Lügenpresse  Vorratsdatenspeicherung  Snoopers  Charter  investigative  journalism  Whistleblower  tracking  bulk  data  collection  democracy  freedom  freedom  of  press  Secret  Courts  FISA  Court  FISAAA  BND  military–industrial 
august 2015 by asterisk2a
Pressure mounts over claims Police Scotland breached rules over spying on journalists (From Herald Scotland)
PRESSURE is mounting on ministers to take action on Police Scotland amid further criticism of the force over claims it illegally spied on a journalist to uncover sources. The force's elite Counter Corruption Unit (CCU) is said to have snooped on the reporter without getting judicial approval - a tactic which was banned on March 25 following a row over officers using the Regulation of Investigatory Powers Act (Ripa) to access journalists’ phone records, texts and emails. // [ endemic and systemic! you are not safe. period. ] // &! bbc.in/1OQEaGJ - Ministers questioned over Police Scotland 'spying' claims // &! bbc.in/1KUFPu9 &! bbc.in/1Maojno << time to get their story right!?
Met  Police  GCHQ  freedom  of  press  UK  journalismus  investigative  journalism  journalism  corporate  state  corporate  media  media  conglomerate  Pressefreiheit  Lügenpresse  Five  Eyes  NSA  Career  Politicians  No  Representation  democracy  Surveillance-Industrial  Complex  surveillance  state  Orwellian  military–industrial  2015  human  rights  Internet  Privacy  Privacy  Snoopers  Charter  Vorratsdatenspeicherung  abuse  of  power  corruption  manufactured  consent  populism  War  on  Terror  False  Flag  organised  crime  cyber  cyber  crime  Cryptopocalypse  cryptography  encryption  backdoors  backdoor  propaganda  Intelligence  Agency  Foreign  Intelligence  corporate  espionage  industrial  espionage  cyber  espionage  Nationalism  national  interest  domestic  affairs  affairs  policy  relations  MI5  MI6  Secret  Courts  FISA  Court  FISAAA 
august 2015 by asterisk2a
Windows 10: Microsoft under attack over privacy | Technology | The Guardian
>> It is not Free. Period! Stupid. << // &! Get Tracked with Windows 10 | Tech Talk Today 198 - youtu.be/Gh0y5drKwAE &! http://www.jupiterbroadcasting.com/85697/get-tracked-with-windows-10-ttt-198/ &! Microsoft’s new small print – how your personal data is (ab)used - https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/ &! &! bit.ly/1eNKQJm - Mit Windows 10 wird alles besser - sagt Microsoft. Viele Neuerungen funktionieren aber nur, weil der Konzern auf Nutzerdaten zugreift. Wir zeigen, wie Sie die Datensammelei sinnvoll einschränken. [ einschraenken, nicht abschaltbar - selling you out ] &! bit.ly/1g2TLHN - Like all proprietary software, Windows 10 puts those that use it under the thumb of its owner. [...] Windows is an open window onto you &! bit.ly/1SFoXhT &! Linux: The OS of the Future - youtu.be/cTpujBq1Zi0 // &! bit.ly/1MUDxeB &! youtu.be/ULq1ajA1Jek
TOS  Microsoft  Platform  Internet  Privacy  Privacy  Big  Data  advertisement  advertisement  targeting  user  Facebook  Windows  10  business  model  Free  perma-cookie  ISP  Google  Wireless  Carrier  Android  Apple  human  rights  Linux  Open  Source  Twitter  backdoors  backdoor  Cryptopocalypse  encryption  NSA  FISA  Court  FISAAA  corporate  espionage  industrial  espionage  cyber  espionage  national  interest  Nationalism  Five  Eyes  GCHQ  Secret  Courts  cryptography  FOSS  GNU  GNU/Linux  GPL 
august 2015 by asterisk2a
Sicherheitshysterie nach britischem Urteil gegen Vorratsdatenspeicherung: „Tausende Leben in Gefahr“ | netzpolitik.org
Die Notwendigkeit der technisierten Überwachung wird gar nicht mehr hinterfragt, die gerichtlichen Backpfeifen an die britische Regierung stattdessen in grotesker Weise kommentiert. So titelt beispielhaft der Telegraph in Anlehnung an eine Aussage der britischen Innenministerin Theresa May: Thousands of lives at risk after High Court rules snooping powers unlawful. // theguardian.com/world/surveillance - bit.ly/1fa4mQP // &! bit.ly/1CMnrUg &! bit.ly/1DoKqiZ - Why appeasing governments over encryption will never work. David Cameron & the director of the FBI have both asked for ‘backdoors’ to be included in encryption software [...] Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications, is worth reading in full. It concludes that proposals for backdoors are “unworkable in practice, raise enormous legal and ethical questions, and would undo progress on security at a time when internet vulnerabilities are causing extreme economic harm”.
Snoopers  Charter  Vorratsdatenspeicherung  DRIPA  data  retention  law  bulk  data  collection  propaganda  surveillance  surveillance  state  Orwellian  False  Flag  War  on  Terror  ISIS  ISIL  Surveillance-Industrial  Complex  military–industrial  UK  GCHQ  MI5  Met  Police  abuse  of  power  transparency  accountability  democracy  Secret  Courts  Five  Eyes  British  Empire  populism  Lügenpresse  manufactured  consent  corporate  state  NSA  Career  Politicians  Tony  Blair  presidency  barackobama  David  Cameron  society  Gesellschaft  European  Union  Internet  Privacy  Privacy  human  rights  self-censorship  encryption  Cryptopocalypse  backdoors  backdoor  FBI  MI6  cyber  corporate  espionage  industrial  espionage  cyber  espionage  Intelligence  Agency  Foreign  Intelligence  national  interest  protectionism  economic  damage  IT  Security  policy  folly  policy  error 
july 2015 by asterisk2a
NSA und GCHQ spähen Anti-Viren-Hersteller wie Kaspersky aus - SPIEGEL ONLINE
[ Washington, even Obama doesn't know about the true extent. NSA, Five Eyes, for profit military and intelligence complex is an entity that is OVER Washington. Because telling Washington would be a National Security risk. ] Frisch veröffentlichte Snowden-Unterlagen zeigen, wie der amerikanische und der britische Geheimdienst gezielt Anti-Viren-Software austricksen und deren Hersteller ausforschen. In den Dokumenten taucht auch ein deutscher Anbieter auf. [...] Der britische Geheimdienst GCHQ und die amerikanische NSA haben gezielt Anti-Viren-Hersteller ausspioniert. Ziel war es offenbar, Wege zu finden, die Virenschutzprogramme auszutricksen: Die Schadsoftware der Geheimdienste sollte von den Programmen unentdeckt bleiben.
NSA  GCHQ  Five  Eyes  surveillance  state  Cryptopocalypse  encryption  backdoors  backdoor  TrueCrypt  Edward  Snowden  Reverse  Engineering  FISA  Court  Secret  Courts  UK  USA  presidency  barackobama  Stasi  2.0  Imperialism  False  Flag  corporate  espionage  industrial  espionage  cyber  espionage  cyber  war  IT  Security  cyber  crime  cyber  cyber  attack  Privacy  Internet  Privacy  Antivirus  Orwellian  Empire  vested  interest  interest  groups  national  interest  military–industrial  complex  Intelligence  Agency  Foreign  Intelligence  Cold  relations  policy  affairs  Wikileaks  cablegate  Career  Politicians  No  Representation  Totalitarian  Despotism  oligarchy  oversight  transparency  democracy  Washington  Security 
june 2015 by asterisk2a
UN: Government efforts to undermine encryption threaten basic human rights | PandoDaily
The report also focuses on schemes from the United Kingdom and the US to force tech companies to include backdoors in their products, thus giving these governments unfettered access to what consumers believe is private data.
encryption  backdoors  backdoor  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  human  rights  surveillance  state  Orwellian  Dataretention  Vorratsdatenspeicherung  UK  USA  Europe  Postgeheimnis 
may 2015 by asterisk2a
The government's data law - an attack on encryption? - BBC News
The row over forcing internet service providers (ISPs) to hold on to far more data about their users' online activities has stretched over three parliaments. The idea first came up under the last Labour government, when it was quashed by Conservative and Liberal Democrat opposition. Then it was resurrected by the Coalition, with Theresa May's plans - immediately dubbed the Snooper's Charter - blocked by her Liberal Democrat partners. // &! "radicalisation" http://www.bbc.co.uk/news/uk-politics-32714802 &! http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/11630495/Muslim-Council-hits-back-at-top-cops-Marks-and-Spencer-radicalisation-comments.html https://youtu.be/slOe_4zxQCI
Snoopers  Charter  UK  Vorratsdatenspeicherung  GCHQ  surveillance  state  Orwellian  War  on  Terror  War  on  Drugs  organised  crime  False  Flag  Privacy  Internet  Privacy  human  rights  Conservative  Party  David  Cameron  Theresa  May  backdoors  backdoor  encryption  cryptography  Cryptopocalypse 
may 2015 by asterisk2a
Danny Boyle: the Olympic opening ceremony would be done differently in 2015 - Newsnight - YouTube
do we want to give them the data, our lives?! it seems positive and benign, but it changes our lives in the long-term and we are only seen as data pools. // dave eggers novel the circle
Internet  Privacy  book  Facebook  Google  Big  Data  perma  cookie  Orwellian  State  surveillance  FISA  Court  FISAAA  Secret  Courts  NSA  GCHQ  Foreign  Intelligence  Intelligence  Agency  corruption  abuse  of  power  Privacy  human  rights  analytics  Vorratsdatenspeicherung  Five  Eyes  False  Flag  War  on  Terror  cyber  cyber  espionage  corporate  espionage  industrial  espionage  Microsoft  backdoors  backdoor  encryption  cryptography  Cryptopocalypse 
may 2015 by asterisk2a
Europol chief warns on computer encryption - BBC News
disproportionate spying on ordinary civilians, and officials like Angela Merkel.
encryption  War  on  Terror  backdoor  backdoors  organised  crime  War  on  Drugs  surveillance  state  Orwellian  NSA  GCHQ  Five  Eyes 
march 2015 by asterisk2a
Linux Journal - Wikipedia, the free encyclopedia
In early July 2014 it was revealed that the NSA's XKeyscore program targeted readers of Linux Journal, which the NSA considers an "extremist forum". // &! NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance - http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance // &! NSA targets the privacy-conscious - http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html "Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA." - visiting site X puts you on watch list/collect data list - ie Wikileaks, Tor, Linux Journal, CCC unter anderem !+& bit.ly/1sZSWV9 >> leads to self-censorship like in East Germany.
NSA  Internet  Privacy  Privacy  human  rights  XKeyscore  Linux  CCC  activism  activists  Hacktivism  target  targeting  GCHQ  encryption  cryptography  Cryptopocalypse  IT  Security  cyber  cyber  war  cyber  espionage  corporate  espionage  industrial  espionage  espionage  FISA  Court  FISAAA  Foreign  Intelligence  Five  Eyes  presidency  barackobama  Stasi  Stasi  2.0  history  backdoor  backdoors  abuse  of  power  surveillance  state  Orwellian  Big  Data  Meta  Data  Unix  Google  Search  Tor  VPN  anonymity  self-censorship  free  speech  freedom  of  press  freespeech  free  press  Pressefreiheit  Meinungsfreiheit  Information  wants  to  be  free  knowledge  M 
february 2015 by asterisk2a
Kaspersky claims US spies can infect computers with malware that is almost impossible to detect | PandoDaily
NSA has found a way to infect computers targeted for surveillance with malware that is almost impossible to detect and even harder to remove. Kaspersky Lab says in its report that a threat actor known as the Equation Group made this possible by infecting firmware used in hard drives made by the world’s top manufacturers. // &! Reddit - bit.ly/1ATpm6v >> According to Kaspersky, getting the malicious code into a drive’s firmware is not an easy task, and can’t be done with help of public tools, meaning that the NSA had to have access to source codes for hard drives produced by these companies. [meaning they asked for access (and or intercepted orders) when OEM orders came from targeted countries/firms? or spoof hw vendor sites and let them download the manipulated firmware] &! bit.ly/19vzSpI - ie Iran and Russia.
NSA  CIA  surveillance  state  Orwellian  Foreign  Intelligence  corporate  espionage  cyber  espionage  espionage  industrial  espionage  GCHQ  Five  Eyes  backdoor  backdoors  corporate  values  corporate  governance  ethical  machine  FISA  Court  FISAAA  Regin  Whistleblower  rootkit  cyber  war  Iratemonk  Firmware  nls_933w.dll  USB  Air  Gap  cyber  security  cyber  attack  cyber  crime  USA  presidency  barackobama  Stuxnet  organised  crime  human  rights  cryptography  Cryptopocalypse  encryption  IT  on  Terror  Malware  Internet  Privacy  Privacy 
february 2015 by asterisk2a
EFF’s Game Plan for Ending Global Mass Surveillance | Electronic Frontier Foundation
[...] Most people haven’t even heard of it, but Executive Order 12333 is the primary authority the NSA uses to engage in the surveillance of people outside the U.S. While Congress is considering much-needed reforms to the Patriot Act, there’s been almost no debate about Executive Order 12333. [...] [... and its also the private industry as contractor shovelling money for Wall Street shareholders, paid for by tax payer money ...]
EFF  surveillance  state  Orwellian  NSA  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  Big  Data  metadata  Meta  Data  human  rights  USA  Five  Eyes  Foreign  Intelligence  Intelligence  Agency  GCHQ  backdoor  backdoors  CIA  FBI  cyber  security  cyber  attack  cyber  war  cyber  espionage  corporate  espionage  espionage  FISA  Court  FISAAA  presidency  barackobama  David  Cameron  democracy  governance  transparency  accountability  Career  Politicians  Patriot  Act  Act  Whistleblower 
february 2015 by asterisk2a
UK government asks: How's our hacking?
UK gov releases equipment interference guidelines for spy & law enforcement agencies; the guidelines never calls it hacking but 'interference activities; Deputy Director @ Privacy International Eric King (@e3i5) says it's the UK gov's attempt to grant itself some of the most intrusive powers. // "This is the first time that the agencies have admitted that they are in the hacking business," Eric King, the deputy director of London-based digital rights watchdog Privacy International, told Mashable. King said that it amounts to a belated attempt to give these activities a scrap of legal basis, in the face of a lawsuit filed by his group last year, which challenged the legality of the UK intelligence service GCHQ's hacking activities, revealed by Edward Snowden documents. For King, the document is basically an attempt by the UK government to grant itself "some of the most invasive and intrusive" powers it has at its disposal.
UK  GCHQ  David  Cameron  surveillance  state  Orwellian  cyber  espionage  corporate  espionage  espionage  Intelligence  Agency  Foreign  Intelligence  presidency  barackobama  NSA  CIA  FBI  relations  policy  affairs  Politics  Political  Governance  corporate  ethical  machine  Europe  Five  Eyes  Career  Politicians  abuse  of  power  transparency  accountability  trust  trustagent  confidence  democracy  unintended  consequences  Internet  Privacy  Privacy  human  rights  War  on  Terror  War  on  Drugs  organised  crime  encryption  backdoor  backdoors  wiretapping  interdiction 
february 2015 by asterisk2a
Europarat warnt: “Massenüberwachung ist eine grundlegende Bedrohung der Menschenrechte” | netzpolitik.org
>> Bürger sollen nur überwacht werden dürfen, wenn ein Gerichtsbeschluss und ein begründeter Verdacht vorliegt. [...] Das Ausnutzen von Backdoors, 0-day-exploits oder der Schwächung von Verschlüsselungsstandards soll verboten werden. [...] Whistleblower, die illegale Überwachungsaktivitäten aufdecken, sollen zuverlässig und effektiv geschützt werden – inklusive der Gewährung von Asyl. [...] [...] Die NSA und ihre Partner betreiben vermutlich seit Jahren Wirtschaftsspionage unter dem Deckmantel der Terrorismusabwehr. Anders sind verwanzte Büros, wie etwa die des Industriedienstleisters Ferrostaal, jedenfalls schwer zu erklären. Auch gibt es gezielte Programme zur Sammlung von sensiblen Informationen über politische Gegner, wie etwa deren Pornokonsum.
surveillance  state  Orwellian  NSA  GCHQ  Internet  Privacy  Privacy  human  rights  warrant  Big  Data  metadata  unintended  consequences  freedom  of  press  free  speech  Pressefreiheit  investigative  journalism  journalism  journalismus  BND  Europe  War  on  Terror  War  on  Drugs  organised  crime  backdoor  backdoors  encryption  Whistleblower  Political  Governance  corporate  abuse  of  power  code  of  conduct  self-censorship  corporate  espionage  Act  cyber  espionage  espionage  FISA  Court  FISAAA  Secret  Courts  UK  presidency  barackobama  David  Cameron  USA  Five  Eyes  Career  Politicians  ethical  beliefs  moral  beliefs  Unrechtsstaat 
february 2015 by asterisk2a
Apple may have compromised everyone’s security for access to China | PandoDaily
But if Apple really did provide access to the iPhone operating system’s source code, it should admit as much so people know the degree to which their security may be compromised, all for the sake of Apple’s business ambitions.
Appel  iPhone  China  cyber  security  internet  security  Wall  Street  Don't  be  evil  corporate  governance  surveillance  state  surveillance  Privacy  Privacy  USA  encryption  backdoor  man-in-the-middle  Whistleblower 
january 2015 by asterisk2a
Die offizielle Linie der Bundesregierung zur Verschlüsselung | netzpolitik.org
In der Bundespressekonferenz ging es heute um die Frage, inwiefern die Bundesregierung sich an den Cryptowars beteiligt und Hintertüren in Verschlüsselungsfragen und beim Staatstrojaner vorantreibt. Die offizielle Linie der Bundesregierung ist, dass sie da nichts vorantreibt. Unser Informationen sind da andere. Aber hier ist das Transcribt aus der Bundespressekonferenz. &! https://netzpolitik.org/2015/wegen-snowden-eu-beauftragter-will-it-anbieter-zu-hintertueren-fuer-verschluesselte-kommunikation-verpflichten/ &! &! The UK and USA have same line - http://blogs.wsj.com/digits/2015/01/16/obama-sides-with-cameron-in-encryption-fight/ Obama about Google, Facebook, Apple & Co “They’re patriots.” thus have to build in backdoors. &! http://techcrunch.com/2015/01/16/political-crypto-decrypted/ &! http://techcrunch.com/2015/01/13/clearly-an-idiot/ &! http://tcrn.ch/1z4vw19
encryption  Five  Eyes  surveillance  state  Orwellian  War  on  Terror  War  on  Drugs  Internet  Privacy  Privacy  oversight  Political  Governance  cryptography  TrueCrypt  NSA  USA  presidency  barackobama  Justice  System  Law  &  Justice  Angela  Merkel  GCHQ  BND  torture  Patriot  Act  cyber  attack  cyber  security  cyber  espionage  corporate  espionage  China  Germany  Europe  Act  espionage  foreign  affairs  foreign  relations  diplomacy  cablegate  cyber  cyber  crime  organised  crime  Career  Politicians  Leadership  investigative  journalism  journalismus  journalism  backdoor  backdoors  Apple  Google  Microsoft  Twitter  Facebook  TOS  Secret  Courts  FISA  Court  UK  Vorratsdatenspeicherung  Snoopers  Charter  Draft  Communications  Data  Bill  Europol  Interpol  Edward  Snowden  Wikileaks  accountability  No  Representation  trust  trustagent  confidence 
january 2015 by asterisk2a
Revealed: how Whisper app tracks ‘anonymous’ users | Technology | The Guardian
[ NSA & Co. served them with an order to comply, in order to watch over employees. Spotting potential Whistleblowers and leaks. Period. ] The technology, for example, enables the company to monitor all the geolocated messages sent from the Pentagon and National Security Agency. It also allows Whisper to track an individual user’s movements over time. When users have turned off their geolocation services, the company also, on a targeted, case-by-case basis, extracts their rough location from IP data emitted by their smartphone. & http://techcrunch.com/2014/10/16/whisper-suspected-of-tracking-user-info-and-sharing-it-with-the-u-s-government/ & http://pando.com/2014/10/08/twitter-sues-the-justice-department-for-the-right-to-be-honest-with-consumers/ & http://www.theguardian.com/media/2014/oct/17/-sp-whisper-tracking-location-users-facts-response
Whisper  TOS  FISA  Court  NSA  CIA  FBI  surveillance  state  Orwellian  Stasi  Internet  Privacy  Privacy  anonymity  anonym  geolocation  Whistleblower  Secret  Courts  TrueCrypt  Lavabit  backdoor  backdoors  transparency  MI5  MI6  Silicon  Valley  Principle  corporate  values  personal  values  corporate  culture 
october 2014 by asterisk2a
Ilija Trojanow: Über den überwachten Menschen und das widerständige Wort - Literatur - derStandard.at › Kultur
Die Existenz der Massenüberwachung wird nicht mehr bestritten, wie noch vor wenigen Jahren, als nicht wenige Kritiker des Buches Angriff auf die Freiheit. Sicherheitswahn, Überwachungsstaat und der Abbau bürgerlicher Rechte von meiner Koautorin Juli Zeh und mir Übertreibung und Hysterie vorwarfen. Wir wissen, dass die NSA zwischen drei und vier Milliarden Menschen überwacht, nämlich alle digitalen Bürger und Bürgerinnen des Planeten. [...] Wir wissen, dass wir dieser Überwachung (fast) nicht entgehen können, auch nicht durch Verschlüsselung unserer Kommunikation, denn bei allen marktüblichen Programmen ist eine kleine Hintertür offen gelassen, durch die Geheimdienste hineinschlüpfen können, [...] Die demokratische Verfasstheit ist weder in Stein gemeißelt noch genetisch einprogrammiert. [...] behördlicher Vertuschung: "nationale Sicherheit" [...] demokratischen Gesellschaft angreift.
NSA  GCHQ  surveillance  state  Orwellian  Internet  Privacy  Privacy  USA  presidency  barackobama  cablegate  Wikileaks  Edward  Snowden  Julian  Assange  book  Europe  UK  encryption  backdoor  backdoors  cyber  security  cyber  espionage  corporate  espionage  security  self-censorship  Zivilgesellschaft  gesellschaft  unrecht  unintended  consequences  history  Stasi  democracy  Democratic  Process  transparency  governance  Political  oversight  Career  Politicians  Law  &  Justice  Justice  System  FISA  Court  Secret  Courts  Whistleblower  investigative  journalism  journalism  journalismus  Washington  organised  crime  War  on  Terror  War  on  Drugs 
october 2014 by asterisk2a
Your iOS 8 Data is Not Beyond Law Enforcement’s Reach… Yet. | Jonathan Zdziarski's Domain
Forensics expert @JZdziarski says as long as Apple allows iOS users to share data between computers & locked devices, some user data is not safe; camera reel photos, videos & recordings are accessible along w/ iTunes media & 3rd-party app data [...] "This means that if your’e arrested, the police will seize both your iPhone and all desktop / laptop machines you own, and use files on the desktop to dump and access all of the above data on your iPhone. This can also be done at an airport, if you are detained. [...] There are a number of forensics tools capable of dumping the memory (and therefore, encryption keys) of your encrypted disk if you’ve left your computer asleep or in hibernate mode. Shut it down."
Apple  Android  backdoor  backdoors  NSA  CIA  surveillance  cyber  security  cyber  attack  cyber  crime  cyber  espionage  FISA  Court  Patriot  Act  War  on  Terror  War  on  Drugs  encryption  sensitive  data  USA 
september 2014 by asterisk2a
Apple - Privacy
In a letter on Apple's privacy page, @Tim_Cook addresses numerous security concerns; Cook assures that iCloud & Apple Pay are safe & encourages 2-factor authentication; he says Apple does not use private data to learn how to better advertise & will never monetize user data; Cook also says Apple has never worked with any gov agency to create a back door in any product & that Apple will never grant gov access to servers
Android  backdoor  backdoors  iOS  Apple  NSA  surveillance  state  Orwellian  Google  FISA  FISA  Court  surveillance 
september 2014 by asterisk2a
Exclusive: Security enthusiasts may revive encryption tool after mystery shutdown | Reuters
Speculation has mounted over the cause of the reversal, with some suggesting that the developers had tired of the decade-long project and others guessing that U.S. authorities had demanded a back-door key from the programmers, as happened with anonymous email provider Lavabit.
Lavabit  TrueCrypt  NSA  backdoor  backdoors  cryptography  Edward  Snowden  Whistleblower  encryption  Privacy  Internet  Privacy 
may 2014 by asterisk2a
CCC-TV - Kryptographie nach Snowden
Die Verwendung von mittelmäßiger Kryptographie scheint gegen Angreifer mit Milliarden-Etat komplett versagt zu haben. Namentlich RC4, MD5 und SHA1 scheinen praxisrelevant brechbar.
encryption  Cryptography  RC4  MD5  SHA4  NSA  AES  MD4  SHA-2  stuxnet  RSA  Security  LLC  Skype  backdoor  Microsoft  FBI  cybersecurity  cyberespionage  cyberwar  cyberattack  Windows  8  corporate  governance  corporatism  conglomerate  Linux  Apple  transparency  oversight  Privacy  Lvabit  Edward  Snowden  Wikileaks  SSL  digital  natives  digitalnatives 
december 2013 by asterisk2a

related tags

&  2.0  abuse  accountability  accounting  Act  activism  activist  activists  advertisement  AES  affairs  Agency  Agreement  Air  Amazon  analytics  Android  Angela  anonym  anonymity  Antivirus  Appel  Apple  Assange  attack  austerity  backdoor  backdoors  backroom  barackobama  be  Belgacom  beliefs  big  Bill  Blair  BND  book  Brexit  bribery  British  bulk  Bundestags  business  cablegate  Cameron  Career  Carrier  CCC  Charter  Chelsea  China  CIA  code  Cold  collection  Communications  communism  complex  conduct  confidence  conglomerate  consent  consequences  Conservative  cookie  corporate  corporatism  corruption  Court  Courts  crime  cryptography  Cryptopocalypse  culture  cyber  cyberattack  cyberespionage  cybersecurity  cyberwar  damage  DARPA  data  Dataretention  David  dealings  democracy  Democratic  Despotism  digital  digitalnatives  diplomacy  DOJ  domestic  Don't  Draft  DRIPA  Dropbox  Drugs  economic  Edward  EFF  Empire  encryption  Engineering  error  espionage  Establishment  ethical  Europe  European  Europol  evil  exploit  extremism  Eyes  Facebook  False  far-right  FBI  Firmware  FISA  FISAAA  Five  Flag  FOI  folly  foreign  foreignaffairs  FOSS  FRance  free  freedom  freespeech  G  Gap  GCHQ  geolocation  geopolitics  George  Germany  gesellschaft  Glenn  GNU  GNU/Linux  Google  governance  GPL  GPS  Greenwald  groups  Hacktivism  history  homescreen  human  Imperialism  industrial  Information  Intelligence  interdiction  interest  internet  Interpol  investigative  Investigatory  iOS  iPhone  Iratemonk  ISIL  ISIS  islamic  ISP  IT  jail  journalism  journalismus  Julian  Justice  knowledge  Lavabit  law  Leadership  Linux  LLC  lobby  Lobbying  lobbyist  Lvabit  Lügenpresse  M  machine  Makers  Malware  man-in-the-middle  Manning  manufactured  May  MD4  MD5  media  Meinungsfreiheit  Merkel  Met  Meta  metadata  MI5  MI6  Microsoft  military–industrial  mobile  mobilephone  model  moral  nasty  national  Nationalism  natives  neoconservatism  neoconservatives  neoliberal  neoliberalism  nls_933w.dll  No  NSA  of  oligarchy  on  online  Open  organised  Orwellian  Osborne  oversight  party  Patriot  Pentago  Pentagon  perma  perma-cookie  personal  Platform  Polarisation  Police  policy  political  Politicians  Politics  populism  Postgeheimnis  power  Powers  presidency  press  Pressefreiheit  Principle  Privacy  Privileged  Process  Profile  profiling  propaganda  protectionism  public  radicalism  RC4  Reaktionismus  Rechtsextremismus  Rechtsruck  Regin  relations  Representation  retention  Reverse  rights  rootkit  RSA  Russia  scandal  Schengen  science  Search  Secret  security  self-censorship  sensitive  sentiment  SHA-2  SHA4  short-term  Silicon  Skype  Smartphone  Snoopers  Snowden  society  Source  speech  SSL  Stasi  state  Street  stuxnet  surveillance  Surveillance-Industrial  System  target  targeting  Terror  theory  Theresa  thinking  to  Toff  Tony  too  Tor  Tories  torture  TOS  Totalitarian  TPM  tracking  transparency  Trojan  Trojaner  TrueCrypt  trust  trustagent  Twitter  UK  unintended  Union  Unix  unrecht  Unrechtsstaat  USA  USB  user  Valley  values  vested  view  Vorratsdatenspeicherung  VPN  Wall  wants  war  warrant  Washington  Westminster  WhatsApp  Whisper  Whistleblower  Wikileaks  Windows  Wireless  wiretapping  World  XKeyscore  Yahoo!  Zero  Zivilgesellschaft 

Copy this bookmark:



description:


tags: